Search results for "Fog Computing"

showing 10 items of 18 documents

PV-Alert: A fog-based architecture for safeguarding vulnerable road users

2017

International audience; High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emer…

Computer science[SPI] Engineering Sciences [physics]Reliability (computer networking)mobile computingLatency (audio)traffic engineering computingCloud computing02 engineering and technologyFog ComputingComputer securitycomputer.software_genreroad vehicles[SPI]Engineering Sciences [physics]Low Latency0502 economics and businessPedestrian Safety0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureArchitecturewireless LANEdge computing050210 logistics & transportationbusiness.industry05 social sciencesLocation awarenessroad traffic020206 networking & telecommunicationsVehiclesEdge computingsmart phonesVulnerable Road UsersRoadsroad accidentsCrowd sensingAccidentsScalabilitymobile radioSafetybusinessroad safetycomputer
researchProduct

Fog Computing based traffic Safety for Connected Vulnerable Road Users

2019

Annually, millions of people die and many more sustain non-fatal injuries because of road traffic crashes. Despite multitude of countermeasures, the number of causalities and disabilities owing to traffic accidents are increasing each year causing grinding social, economic, and health problems. Due to their high volume and lack of protective-shells, more than half of road traffic deaths are imputed to vulnerable road users (VRUs): pedestrians, cyclists and motorcyclists. Mobile devices combined with fog computing can provide feasible solutions to protect VRUs by predicting collusions and warning users of an imminent traffic accident. Mobile devices’ ubiquity and high computational capabilit…

Efficacité énergétiqueTrust Management and Security[INFO.INFO-MC] Computer Science [cs]/Mobile ComputingEnergy EfficiencyPosition accuracy and predictionPrécision de position géographique et taux d'échantillonnageTraffic SafetyFog ComputingGestion de confiance et sécuritéUsagers vulnérables de la routeVulnerable road usersSécurité routière
researchProduct

A fog-assisted system to defend against Sybils in vehicular crowdsourcing

2022

Technological advancements in vehicular transportation systems have led to the growth of novel paradigms, in which vehicles and infrastructures collaborate to infer high-level knowledge about phenomena of interest. Vehicular Social Network (VSN) is one such paradigm in which vehicular network entities are considered as part of an Online Social Network (OSN), paving the way for new services derived from social context. Although vehicular crowdsourcing has tremendous benefits, its deployment in real systems requires to solve important challenges including defense against Sybil attacks. This paper proposes a novel fog-assisted system that uses SybilDriver to minimize the presence of Sybil enti…

Hardware and ArchitectureComputer Networks and CommunicationsSybil detectionCrowdsourcingFog computingTruthfulnessSoftwareComputer Science ApplicationsInformation SystemsVehicular Social Network
researchProduct

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

A data aggregation strategy based on wavelet for the internet of things

2017

The advent of emerging information and communication technologies, such as RFID, small size sensors and sensor networks, has made accessible a huge amount of information that requires sophisticated and efficient search algorithms to support queries on that data. In this paper we focus on the problem of aggregating data collected from these devices to efficiently support queries, inferences or statistics on them. In general, data aggregation techniques are necessary to efficiently collect information in a compact and cost-effective way. Some current solutions try to meet the above criteria, by exploiting different data aggregation techniques, for instance BitVector or Q_Digest. In this manus…

IoTExploitRange query (data structures)Computer science0102 computer and information sciences02 engineering and technologyFog Computingcomputer.software_genre01 natural sciencesWaveletSoftwareSearch algorithmHistogramComputational Theory and Mathematic0202 electrical engineering electronic engineering information engineeringP2PSettore INF/01 - Informaticabusiness.industry020206 networking & telecommunicationsData aggregation; Fog Computing; IoT; P2P; Range query; WaveletData aggregationData aggregator010201 computation theory & mathematicsComputational MathematicRange queryData miningbusinesscomputerWireless sensor networkWaveletSoftware
researchProduct

EFFICIENT AND SECURE ALGORITHMS FOR MOBILE CROWDSENSING THROUGH PERSONAL SMART DEVICES.

2021

The success of the modern pervasive sensing strategies, such as the Social Sensing, strongly depends on the diffusion of smart mobile devices. Smartwatches, smart- phones, and tablets are devices capable of capturing and analyzing data about the user’s context, and can be exploited to infer high-level knowledge about the user himself, and/or the surrounding environment. In this sense, one of the most relevant applications of the Social Sensing paradigm concerns distributed Human Activity Recognition (HAR) in scenarios ranging from health care to urban mobility management, ambient intelligence, and assisted living. Even though some simple HAR techniques can be directly implemented on mo- bil…

Machine LearningSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSocial SensingHuman Activity RecognitionFog Computing
researchProduct

Joint Radio and Computational Resource Allocation in IoT Fog Computing

2018

The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…

Service (systems architecture)IoTEdge deviceComputer Networks and CommunicationsComputer scienceDistributed computingAerospace Engineeringresource allocationCloud computing02 engineering and technologyresursointiComputational resource0203 mechanical engineeringUser experience design0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringstudent project allocationmatching theoryta113ta213business.industry020302 automobile design & engineering020206 networking & telecommunicationsService providerAutomotive EngineeringResource allocationEnhanced Data Rates for GSM Evolutionfog computingbusinessIEEE Transactions on Vehicular Technology
researchProduct

A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices

2019

The diffusion of heterogeneous smart devices capable of capturing and analysing data about users, and/or the environment, has encouraged the growth of novel sensing methodologies. One of the most attractive scenarios in which such devices, such as smartphones, tablet computers, or activity trackers, can be exploited to infer relevant information is human activity recognition (HAR). Even though some simple HAR techniques can be directly implemented on mobile devices, in some cases, such as when complex activities need to be analysed timely, users’ smart devices can operate as part of a more complex architecture. In this article, we propose a multi-device HAR framework that exploits the fog c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniExploitComputer Networks and CommunicationsComputer sciencebusiness.industryBandwidth (signal processing)Activity tracker020206 networking & telecommunicationsCloud computing02 engineering and technologyActivity recognitionHuman–computer interactionHuman activity recognition mobile crowdsensing fog computing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSmart environmentbusinessMobile deviceWearable technologyACM Transactions on Internet Technology
researchProduct

Three-dimensional matching based resource provisioning for the design of low-latency heterogeneous IoT networks

2019

Internet-of-Things (IoT) is a networking architecture where promising, intelligent services are designed via leveraging information from multiple heterogeneous sources of data within the network. However, the availability of such information in a timely manner requires processing and communication of raw data collected from these sources. Therefore, the economic feasibility of IoT-enabled networks relies on the efficient allocation of both computational and communication resources within the network. Since fog computing and 5G cellular networks approach this problem independently, there is a need for joint resource-provisioning of both communication and computational resources in the networ…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniIoTbusiness.industryComputer scienceDistributed computingResource constraintsResource Provisioning020206 networking & telecommunicationsProvisioning02 engineering and technologyFogPRBFog computing0202 electrical engineering electronic engineering information engineeringCellular networkMatching020201 artificial intelligence & image processingLatency (engineering)Internet of ThingsbusinessRaw dataSAP5G5G
researchProduct

WiP: Smart services for an augmented campus

2018

Technological progress in recent years has allowed the design of new intelligent learning systems in smart environments aiming to facilitate users' lives. As a consequence, besides making use of traditional sensors for monitoring the quantities of interest, such systems can also benefit from information obtained from the users' smart devices, which can now be considered as additional sensing tools. In this article, we present the design of a novel system based on the fog computing paradigm that can improve the services offered to users on a smart campus by using different smart devices, i.e., smartphones, smartwatches, tablets, smartcameras and so on. In particular, we will describe a syste…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMultimediaComputer scienceTechnological changebusiness.industrySmart devicesContext (language use)Cloud computing02 engineering and technologyEnergy consumptioncomputer.software_genreSmartwatchIntelligent sensor020204 information systems0202 electrical engineering electronic engineering information engineeringFog computing020201 artificial intelligence & image processingSmart environmentArchitecturebusinesscomputerSmart campus
researchProduct